5.4

CVE-2022-4973

WordPress Core < 6.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via use of the_meta(); function

WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.
Mögliche Gegenmaßnahme
WordPress: Update to one of the following versions, or a newer patched version: 3.7.39, 3.8.39, 3.9.37, 4.0.36, 4.1.36, 4.2.33, 4.3.29, 4.4.28, 4.5.27, 4.6.24, 4.7.24, 4.8.20, 4.9.21, 5.0.17, 5.1.14, 5.2.16, 5.3.13, 5.4.11, 5.5.10, 5.6.9, 5.7.7, 5.8.5, 5.9.4, 6.0.2
Weitere Schwachstelleninformationen
SystemWordPress Core
Produkt WordPress
Version * - 3.6.1
Version 3.7 - 3.7.38
Version 3.8 - 3.8.38
Version 3.9 - 3.9.36
Version 4.0 - 4.0.35
Version 4.1 - 4.1.35
Version 4.2 - 4.2.32
Version 4.3 - 4.3.28
Version 4.4 - 4.4.27
Version 4.5 - 4.5.26
Version 4.6 - 4.6.23
Version 4.7 - 4.7.23
Version 4.8 - 4.8.19
Version 4.9 - 4.9.20
Version 5.0 - 5.0.16
Version 5.1 - 5.1.13
Version 5.2 - 5.2.15
Version 5.3 - 5.3.12
Version 5.4 - 5.4.10
Version 5.5 - 5.5.9
Version 5.6 - 5.6.8
Version 5.7 - 5.7.6
Version 5.8 - 5.8.4
Version 5.9 - 5.9.3
Version 6.0 - 6.0.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
WordpressWordpress Version <= 6.0.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.94% 0.755
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.4 2.3 2.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
security@wordfence.com 4.9 1.8 2.7
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.